OIDC Provider
Rationale
Many organizations want to consolidate the Sign in with Ethereum workflow to a single identity service (Identity Provider or IdP) that could be used to access all their federated services (Relying Parties or RPs) using OpenID Connect to forward the user's session. This reduces overhead and mitigates security risks by consolidating authentication to one protected site instead of several, especially in complex IT systems that have many services for their users to access.
Getting Started
The OIDC Provider implementation of Sign in with Ethereum can be found here:
signinwithethereum/siwe-oidc
→
Currently, two runtime modes are supported: (1) a standalone executable (using
Axum and Redis) and (2) a WASM module within a Cloudflare Worker. Both are built
from the same codebase, specializing at build time. Compilation with a cargo
target
of wasm32
will build for Cloudflare Worker deployments.